
Audit Logs for Mail Explorer Searches

By
Every search in Mail Explorer is now included in the Audit Logs
Mail Explorer allows administrators access to every in the organization.
This type of access is crucial for responding to ongoing incidents, evaluating phishing campaigns, compromised accounts and more. However, it also needs to be closely monitored to ensure administrators don’t abuse or misuse this access.
Harmony Email & Collaboration now adds audit log for every Mail Explorer search, to track the different filters applied by administrators. It is an addition to the audit log that is already being generated for every email body preview / download.
Note – this feature is currently being gradually deployed and you should see it in your portal in the next week
You may also like
Check Point’s SASE Tops Scores for Threat Prevention
Known malware is dangerous, but the real risk lies in ...
Love Gone Phishy: Check Point Research Exposes Valentine’s Day Cyber Threats
Key Findings In January 2025, we observed over 18,000 new ...
How Electric AI Strengthened Its Cloud Security with AI-Powered Solutions
Electric AI, a New York-based IT platform provider serving nearly ...
Check Point Software Collaborates with AppDirect to Offer Streamlined Cyber Security Solutions
Check Point Software and AppDirect, a B2B subscription commerce platform, ...